Module 3

3.1

Engagement Methodology

In a CTF, the goal is the flag. In an engagement, the goal is to assess the security posture of the environment and communicate risk to the client. That’s a fundamentally different objective, and it requires a methodology — not just a sequence of attacks.

Professional pentesters work within established frameworks. The most common are PTES (Penetration Testing Execution Standard), OWASP (for web applications), and OSSTMM. These aren’t checklists to follow blindly — they’re structures that ensure comprehensive coverage and consistent quality.

A methodology does three things for you:

Coverage: It ensures you don’t skip phases. Beginners jump straight to exploitation. A methodology reminds you to enumerate thoroughly before exploiting, and to document as you go.

Defensibility: When the client asks “how did you approach this?” you can point to a recognized framework. This is especially important if a finding is disputed.

Efficiency: A structured approach prevents wasted time. You know what to do next without stopping to think about it.

For the Navigating Security Corp engagement, TadiSec follows PTES with phases adapted for an internal AD assessment: intelligence gathering, vulnerability analysis, exploitation, post-exploitation (lateral movement and privilege escalation), and reporting.

On the right, categorize ten activities from the Navigating Security Corp engagement into their correct methodology phases.

Challenge

Categorize by Phase

multiple-choice

For each activity, select which methodology phase it belongs to.

Intelligence GatheringVulnerability AnalysisExploitationPost-ExploitationReporting

Ran BloodHound to map Active Directory trust relationships

Wrote the executive summary for the client report

Reviewed the scope of work with the client

Exploited a Kerberoastable service account to obtain a TGS ticket

Used the cracked svc_adbackup credentials to authenticate to DC01 and escalate from Domain Users to full domain admin access via DCSync

Ran a discovery scan of 10.1.1.0/24 to map reachable hosts, then scanned DC01 (10.1.1.10) for open ports and services

Identified a missing patch on the domain controller running SMBv1

Escalated privileges to Domain Admin via unconstrained delegation

Took screenshots of the Domain Admin desktop as evidence

Assigned a CVSS severity rating to the Kerberoasting finding